US10986626B2 - Robust control plane for management of a multi-band wireless networking system - Google Patents
Robust control plane for management of a multi-band wireless networking system Download PDFInfo
- Publication number
- US10986626B2 US10986626B2 US15/954,411 US201815954411A US10986626B2 US 10986626 B2 US10986626 B2 US 10986626B2 US 201815954411 A US201815954411 A US 201815954411A US 10986626 B2 US10986626 B2 US 10986626B2
- Authority
- US
- United States
- Prior art keywords
- control plane
- wireless networking
- packet
- band
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
- 230000006855 networking Effects 0.000 title claims abstract description 121
- 238000000034 method Methods 0.000 claims abstract description 74
- 238000004891 communication Methods 0.000 claims description 106
- 239000003795 chemical substances by application Substances 0.000 claims description 43
- 230000005540 biological transmission Effects 0.000 claims description 34
- 238000012545 processing Methods 0.000 claims description 21
- 239000003550 marker Substances 0.000 claims description 14
- 230000004048 modification Effects 0.000 claims description 5
- 238000012986 modification Methods 0.000 claims description 5
- 238000012544 monitoring process Methods 0.000 claims description 5
- 238000009826 distribution Methods 0.000 claims description 2
- 238000012546 transfer Methods 0.000 abstract description 8
- 230000008569 process Effects 0.000 description 34
- 238000010586 diagram Methods 0.000 description 29
- 238000007726 management method Methods 0.000 description 19
- 238000003860 storage Methods 0.000 description 8
- 230000006870 function Effects 0.000 description 6
- 230000004044 response Effects 0.000 description 6
- 230000001934 delay Effects 0.000 description 4
- 230000000694 effects Effects 0.000 description 3
- 238000004590 computer program Methods 0.000 description 2
- 230000001902 propagating effect Effects 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 235000020289 caffè mocha Nutrition 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000000052 comparative effect Effects 0.000 description 1
- 230000001276 controlling effect Effects 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000005670 electromagnetic radiation Effects 0.000 description 1
- 239000004744 fabric Substances 0.000 description 1
- 230000007274 generation of a signal involved in cell-cell signaling Effects 0.000 description 1
- 238000010348 incorporation Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000005304 joining Methods 0.000 description 1
- 230000003278 mimic effect Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/04—Arrangements for maintaining operational condition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/20—Control channels or signalling for resource management
- H04W72/27—Control channels or signalling for resource management between access points
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
- H04W40/248—Connectivity information update
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/18—Multiprotocol handlers, e.g. single devices capable of handling multiple protocols
-
- H04W72/0426—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04J—MULTIPLEX COMMUNICATION
- H04J3/00—Time-division multiplex systems
- H04J3/02—Details
- H04J3/06—Synchronising arrangements
- H04J3/0635—Clock or time synchronisation in a network
- H04J3/0638—Clock or time synchronisation among nodes; Internode synchronisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/0001—Systems modifying transmission characteristics according to link quality, e.g. power backoff
- H04L1/0002—Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission rate
- H04L1/0003—Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission rate by switching between different modulation schemes
- H04L1/0004—Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission rate by switching between different modulation schemes applied to control information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/12—Arrangements for detecting or preventing errors in the information received by using return channel
- H04L1/16—Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
- H04L1/18—Automatic repetition systems, e.g. Van Duuren systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/32—Carrier systems characterised by combinations of two or more of the types covered by groups H04L27/02, H04L27/10, H04L27/18 or H04L27/26
- H04L27/34—Amplitude- and phase-modulated carrier systems, e.g. quadrature-amplitude modulated carrier systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0813—Configuration setting characterised by the conditions triggering a change of settings
- H04L41/082—Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/12—Discovery or management of network topologies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/22—Parsing or analysis of headers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3278—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/18—Network planning tools
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/02—Arrangements for optimising operational condition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/0005—Control or signalling for completing the hand-off
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
- H04W40/244—Connectivity information management, e.g. connectivity discovery or connectivity update using a network of reference devices, e.g. beaconing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/20—Selecting an access point
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W56/00—Synchronisation arrangements
- H04W56/001—Synchronization between nodes
- H04W56/0015—Synchronization between nodes one node acting as a reference for the others
-
- H04W72/1242—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/50—Allocation or scheduling criteria for wireless resources
- H04W72/56—Allocation or scheduling criteria for wireless resources based on priority criteria
- H04W72/566—Allocation or scheduling criteria for wireless resources based on priority criteria of the information or information source or recipient
- H04W72/569—Allocation or scheduling criteria for wireless resources based on priority criteria of the information or information source or recipient of the traffic information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/0001—Systems modifying transmission characteristics according to link quality, e.g. power backoff
- H04L1/0002—Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission rate
- H04L1/0003—Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission rate by switching between different modulation schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/12—Arrangements for detecting or preventing errors in the information received by using return channel
- H04L1/16—Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
- H04L1/18—Automatic repetition systems, e.g. Van Duuren systems
- H04L1/1812—Hybrid protocols; Hybrid automatic repeat request [HARQ]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/12—Arrangements for detecting or preventing errors in the information received by using return channel
- H04L1/16—Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
- H04L1/18—Automatic repetition systems, e.g. Van Duuren systems
- H04L1/1867—Arrangements specially adapted for the transmitter end
- H04L1/188—Time-out mechanisms
-
- H04L61/1511—
-
- H04L61/2015—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/45—Network directories; Name-to-address mapping
- H04L61/4505—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
- H04L61/4511—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/50—Address allocation
- H04L61/5007—Internet protocol [IP] addresses
- H04L61/5014—Internet protocol [IP] addresses using dynamic host configuration protocol [DHCP] or bootstrap protocol [BOOTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
- H04L69/322—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/324—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the data link layer [OSI layer 2], e.g. HDLC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
- H04L69/322—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/329—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/06—Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
- H04W84/20—Master-slave selection or change arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W92/00—Interfaces specially adapted for wireless communication networks
- H04W92/16—Interfaces between hierarchically similar devices
- H04W92/20—Interfaces between hierarchically similar devices between access points
Definitions
- Various of the disclosed embodiments concern communications networks involving multiple wireless access points (WAPs or APs). More specifically, embodiments of the invention concern an intelligent multi-AP management system.
- WAPs or APs wireless access points
- Networking systems including multiple wireless APs are a relatively recent innovation. While such networking systems provide several benefits such as enabling broader wireless coverage, they also present certain challenges related to reliability and practicality. For example, effectively operating wireless networking systems including multiple APs often involves the exchange of control information between the APs. However, conventional solutions cannot guarantee delivery of this control information, nor can conventional solutions deliver such information without causing unworkable delays due to latency. As such, deployment of control functionality in current systems often results in disruption of client services.
- Embodiments of the invention are described in the context of a multi-band (e.g., tri-band) wireless networking system.
- the multi-band wireless networking system includes multiple wireless networking devices that are interconnected via a dedicated wireless communication channel or “backhaul.” At least one of the wireless networking devices is connected to the Internet and serves as a router.
- the multi-band wireless network formed by the multiple wireless networking devices provides broad wireless coverage to client devices.
- the robust control plane can be implemented by a software entity running above layers 1 and 2.
- protocols for communicating control information over the robust control plane are established to guarantee delivery while minimizing latency.
- established protocols for communicating control information may include any of the use of robust data rates, use of multiple backhaul channels, use of hybrid Automatic Repeat Request (ARQ), use of dedicated control channels, use of alternative transport protocols, and implementation of distributed router functionality.
- ARQ Automatic Repeat Request
- FIG. 1 shows a diagram of an example node in the form of a wireless AP
- FIG. 2 shows a schematic diagram of an example wireless backhaul established between two nodes in a multi-band wireless networking system
- FIG. 3 shows schematic diagram of an example multi-band wireless networking system providing broad wireless coverage to a client device
- FIG. 4 shows a flow diagram of an example process for managing a multi-band wireless networking system using a robust control plane
- FIG. 5 shows a schematic diagram illustrating an implementation of a robust control plane at a node in a multi-band wireless networking system
- FIG. 6A shows a schematic diagram illustrating an implementation of a robust control plane in the context of a layer stack according to the Open Systems Interconnect (OSI) architecture model;
- OSI Open Systems Interconnect
- FIG. 6B shows a schematic diagram illustrating an implementation of a robust control plane in an application layer of a layer stack according to the TCP/IP architecture model
- FIG. 7A shows a diagram illustrating communication between internal components at an example node
- FIG. 7B shows a representation of an example control plane frame
- FIG. 8 shows a flow diagram of an example process for transmitting control plane packets over a robust control plane
- FIG. 9 shows a flow diagram of an example process for controlling data rates in a robust control plane
- FIG. 10 shows an example schematic diagram illustrating the use of hybrid ARQ in a robust control plane
- FIG. 11A shows a diagram of an example multi-band wireless networking system with distributed Dynamic Host Configuration Protocol (DHCP) functionality;
- DHCP Dynamic Host Configuration Protocol
- FIG. 11B shows a diagram of an example multi-band wireless networking system with distributed Domain Name Server (DNS) functionality
- FIG. 11C shows a diagram of the system of FIG. 11A illustrating an example process for allocating ranges of IP addresses to DHCP agents at satellite nodes;
- FIG. 11D shows a diagram of the system of FIG. 11A illustrating an example process for assigning an IP address to a client device
- FIG. 11E shows a diagram of the system of FIG. 11A illustrating an example process for assigning an IP address to a roaming client device
- FIG. 11F shows a diagram of the system of FIG. 11A illustrating an example process for releasing a previously assigned IP address after a client device has disconnected
- FIG. 12 shows a diagram of an example of a processing system in which at least some operations described in this disclosure can be implemented.
- the multi-band wireless networking system includes multiple wireless networking devices also referred to herein as nodes. At least one of the wireless networking devices is connected to the Internet and serves as a router. The remaining wireless networking devices serve as satellites that are wirelessly connected to the router via a wireless channel (i.e., a band), which is dedicated to the communications between the wireless networking devices (i.e., a dedicated backhaul). Both the router and the satellites provide wireless network connections (e.g., Wi-Fi connections) to client devices, such as desktop computers, laptop computers, tablet computers, mobile phones, wearable smart devices, game consoles, smart home devices, etc.
- client devices such as desktop computers, laptop computers, tablet computers, mobile phones, wearable smart devices, game consoles, smart home devices, etc.
- the router and the satellites together provide a single wireless network having broad coverage to the client devices.
- the multi-band wireless networking system dynamically optimizes the wireless connections of the client devices without the need of reconnecting.
- An example of the multi-band wireless networking system is the NETGEAR® Orbi® system.
- Such systems are exemplified in U.S. patent application Ser. No. 15/287,711, filed Oct. 6, 2016, and Ser. No. 15/271,912, filed Sep. 21, 2016, both of which are hereby incorporated by reference in their entireties for all purposes.
- the wireless networking devices of a multi-band wireless networking system can include radio components for multiple wireless bands, such as 2.5 GHz band, 5 GHz low band, and 5 GHz high band.
- at least one of the bands can be dedicated to the wireless communications among the wireless networking devices of the system.
- Such wireless communications among the wireless networking devices of the system are referred to herein as “backhaul” communications.
- Any other bands can be used for wireless communications between the wireless networking devices of the system and client devices connecting to the system.
- the wireless communications between the wireless networking devices of the system and client devices are referred to herein as “fronthaul” communications.
- FIG. 1 is a block diagram of an example node 100 of a multi-band wireless networking system.
- the term “node” in this context may refer to any type of wireless networking device configured for the transmission and/or reception of wireless communication signals.
- nodes may include wireless APs, Bluetooth devices, signal repeaters, signal monitors, etc.
- the example node 100 includes radio components for a number of wireless bands, such as a 2.4 GHz band radio 102 , a 5 GHz low band radio 104 , a 5 GHz high band radio 106 , and a sub-1 GHz radio 108 .
- the node 100 also includes a processor 210 for executing program logic and a digital storage or memory 112 including instructions 114 to be executed by the processor 110 .
- the example node may also include a network interface 116 for connecting to a wired network and providing overall access to the Internet to the system, though generally only a base unit (i.e., router node) is actually connected to the Internet.
- the various components of example node 100 are communicatively coupled via a bus 118 .
- the node 100 depicted in FIG. 1 is an example provided for illustrative purposes. Other nodes may include fewer or more components than are shown in FIG. 1 . Additional details regarding some of the components of example node 100 are described with the respect to the example processing system 1200 in FIG. 12 .
- FIG. 2 is a block diagram showing a backhaul link established between two nodes in a multi-band wireless networking system.
- Each of the two nodes depicted in FIG. 2 may be the same or similar to the example node 100 depicted in FIG. 1 .
- a multi-band wireless networking system may be implemented as a mesh network with multiple nodes comprising mesh points in the mesh network.
- the technique described herein can be readily implemented in other types of network configurations such as ring, star, etc.
- the two nodes 200 a and 200 b each include multiple radios 220 a , 222 a , 224 a and 220 b , 222 b , 224 b , respectively.
- the multiple radios can include radios operating on a 2.5 GHz band, a 5 GHz low band, and a 5 GHz high band.
- the nodes 200 a and 200 b use some of the radios to communicate with various clients 230 , 232 , 234 , and 236 .
- at least one radio at each node is used to establish a dedicated backhaul 210 between the nodes.
- the number of nodes and radios per node can vary depending on the implementation.
- the nodes 200 a and 200 b may also include sub-1 GHz radios (e.g., as shown in FIG. 1 ) that may be used to establish an additional dedicated backhaul between nodes.
- a sub-1 GHz radio and a 5 GHz high band radio may be dedicated to the wireless communications among nodes in a multi-band wireless networking system.
- the wireless communications among the nodes of a multi-band wireless networking system are called backhaul communications.
- backhaul communications can refer to two different types of communications: control communications (also referred to as “management” and/or “coordination” communications) critical to the functioning of a multi-band wireless network, and communications propagating the data passed throughout the network (e.g., data packet forwarding to and from a gateway and the Internet).
- control communications also referred to as “management” and/or “coordination” communications
- communications propagating the data passed throughout the network e.g., data packet forwarding to and from a gateway and the Internet.
- the latter of these communications is much more bandwidth intensive. This is because these communications include all the files, streaming content, video game data, and other large communications downloaded and uploaded across a given network.
- control communications originating at nodes in the wireless networking systems and/or destined for other nodes in the wireless networking system (including any communications for management, coordination, configuration, etc.) will be referred to as “control communications.”
- the other bands may be available for use for wireless communications between the nodes (e.g., nodes 200 a and 200 b ) of a multi-band wireless networking system and with client devices (e.g., 230 , 232 , 234 , and 236 ).
- Client devices may communicate over several protocols.
- the wireless communications between the nodes of the multi-band wireless networking system and client devices are called fronthaul communications.
- the radios over which such communications are transmitted and received are also referred to as “client facing.”
- 2.4 GHz band radios and 5 GHz low band radios are used for fronthaul communications.
- each node serving as an AP in a multi-band wireless networking system can operate on a different channel in the 2.4 GHz band.
- the decision for a best channel for each node serving as an AP can be made based on various factors, such as network topology, number of interfering APs on each channel for each unit, noise on each channel for each unit, interference duration as percentage of time for each unit, type of network traffic supported for each node, etc.
- the 2.4 GHz band can be used as a backup for backhaul and/or control communications among units of the system. For example, if a node 100 operating in satellite mode detects that the backhaul channel in the 5 GHz high band is no longer available (e.g., due to strong interference), the node's 2.4 GHz radio component can switch to a scan mode to look for an uplink connection at one of the 2.4 GHz channels with another node operating in router mode.
- a backhaul channel e.g., a channel in the 5 GHz high band
- the node's 2.4 GHz radio component can switch to a scan mode to look for an uplink connection at one of the 2.4 GHz channels with another node operating in router mode.
- the node selects a clean channel that interferes less with other units that are in vicinity.
- a client channel is defined based on a function of interference, number of nodes, and/or other parameters. If the function for a channel is less than a threshold, the channel is a clean channel.
- There are various ways to detect units in vicinity For example, one method uses networking topology among the nodes to detect nodes in vicinity. Beacon power from other nodes is used to detect nodes in vicinity. In some embodiments, a node uses a combination of networking topology and beacon power to detect other nodes of the system in vicinity.
- the nodes serving as APs in multi-band wireless networking system communicate the fronthaul channel selections with other nodes through the dedicated backhaul.
- nodes having higher-priority network traffic have a higher priority in picking the fronthaul channel over other nodes.
- the nodes of a multi-band wireless networking system make decisions regarding fronthaul channel selections in either a centralized way or a distributed way.
- each node decides on channel selection for itself. For example, in some embodiments, a router node selects a fronthaul channel first. Then, each satellite node selects a fronthaul channel after the router node establishes a backhaul link with the satellite nodes.
- the system can optimize the channel selection based on some regular schedule. In some embodiments, nodes handling higher-priority network traffic have a higher priority in picking the fronthaul channel over other nodes during system boot-up or during scheduled channel optimization.
- a router node makes decisions of channel selections for all other satellite nodes of the system. This may be communicated through control communications over the dedicated backhaul.
- Each satellite node establishes a dedicated backhaul link with the router node or an intermediate satellite node and scans the channels in the fronthaul band(s).
- Each satellite node sends detailed information regarding candidates of fronthaul channels to the router node through control communications via the dedicated backhaul.
- the detailed information can include, for example, scan results on all channels in the fronthaul band(s) and interference on all channels in the fronthaul band(s).
- the router node then makes the centralized decision on channel selection periodically over time among other control communications.
- a wireless networking system involving multiple wirelessly interconnected nodes can depend on control and management exchanges that are critical for the network to function. Such exchanges may occur, for example, when new nodes are added or existing nodes are removed, when the topology of the network changes, when credentials (e.g., keys, passwords, certificates) are exchanged between nodes for security purposes, and when client devices are handed off between nodes.
- control and management exchanges may occur, for example, when new nodes are added or existing nodes are removed, when the topology of the network changes, when credentials (e.g., keys, passwords, certificates) are exchanged between nodes for security purposes, and when client devices are handed off between nodes.
- FIG. 3 shows a diagram of an example wireless network 300 including a router node 302 and multiple satellite nodes 304 a , 304 b , 304 c , and 304 d .
- the router node 302 provides overall access to the Internet 360 .
- the multiple nodes 302 and 304 a - d serving as APs collectively provide broad wireless coverage to a client device 330 .
- the control communications between nodes are critical to the functioning of such a system. Delays and interruptions of such control communications due to packet loss, for example, can significantly impact the overall quality of service provided to clients.
- the router node 302 (which is providing the overall connection to the Internet 360 ) receives updating information from the satellite nodes 304 a - d regarding a connecting client 330 .
- This information can include, for example, which satellite node the client 330 is connected to and which IP has been assigned to the client 330 . If this updating information is not communicated accurately and in a timely fashion, the system 300 lags and the client 330 may lose connectivity.
- a multi-band wireless networking system may use a backhaul communication channel (e.g., using 5 GHz high band radios) to exchange control communications between nodes which can be prone to packet loss due to outage or collision.
- a backhaul communication channel e.g., using 5 GHz high band radios
- 802.11 Wi-Fi standards include protocols intended to maximize throughput with an expectation that some latency due to packet loss may occur. This may work for the majority of backhaul communications (i.e., packets forwarded between clients and the Internet) transferring over the backhaul communication link, but may not be effective for control communications for the reasons stated above.
- FIG. 4 is a flow chart of an example process 400 for managing a multi-band wireless networking system using a robust control plane.
- example process 400 begins at step 402 with wirelessly interconnecting multiple nodes (e.g., wireless networking devices) to form a single multi-band wireless network configured to provide broad coverage to a client device.
- nodes e.g., wireless networking devices
- the multiple nodes may include a router or ‘base’ node 302 that provides connectivity to an external network such as the Internet, and one or more satellite nodes 304 a - d .
- the multiple nodes of the multi-band wireless network may be interconnected via one or more dedicated wireless communication channels, for example, in the form of a backhaul (as previously described).
- a control plane can be generally defined as the portion of the multi-band wireless network over which control communications between the multiple nodes are carried.
- the control plane can be conceptually differentiated with a data plane (also referred to as a forwarding plane) which carries the traffic that a given network is designed to carry (e.g., traffic to and from client devices).
- a data plane also referred to as a forwarding plane
- the term “control plane” shall be understood to encompass elements sometimes referred to as belonging to a management plane.
- One or more steps of the example process 400 may be performed by any one or more of the components of the example processing systems described with respect to FIG. 1 or 12 .
- the process depicted in FIG. 4 may be represented in instructions stored in memory that are then executed by a processing unit.
- the process 400 described with respect to FIG. 4 is an example provided for illustrative purposes and is not to be construed as limiting. Other processes may include more or fewer steps than depicted while remaining within the scope of the present disclosure. Further, the steps depicted in example process 400 may be performed in a different order than is shown.
- FIG. 5 shows a diagram that illustrates an example implementation of a control plane at an example node 500 in a multi-band wireless network (e.g., similar to example node 100 described with respect to FIG. 1 ).
- a multi-band wireless network e.g., similar to example node 100 described with respect to FIG. 1 .
- most of the data routing through the node 500 e.g., from a client device to an external network or between nodes
- fronthaul or backhaul traffic as indicated by the solid line arrows
- a data plane 520 e.g., control communications for managing and maintaining the operation of the multi-band wireless networking system
- some of the traffic between nodes e.g., control communications for managing and maintaining the operation of the multi-band wireless networking system
- the broken line arrows is processed and routed over the control plane 530 .
- the control plane traffic may include, for example, control plane packets originating from other nodes and received at node 500 and/or control plane packets generated at the node 500 for transmission to other nodes in the multi-band wireless networking system.
- Control plane traffic may include, for example, routing protocol traffic (e.g., OSPF, EIGRP or BGP, etc.), system configuration/management traffic, topology update traffic, etc.
- control plane 530 and data plane 520 involve processes executed by a shared CPU 510 (e.g., similar to processor 110 described with respect to FIG. 1 ) using the shared resources of memory 512 (e.g., similar to memory 112 described with respect to FIG. 1 ).
- the control plane may be implemented in software which runs above layer 1 and layer 2. Both control plane traffic and data plane traffic may be received at and transmitted by the shared network interface 516 a - b at node 500 (e.g., similar to network interface 116 descried with respect to FIG. 1 ).
- control communications transmitted between nodes over the control plane may be treated differently than standard backhaul communications carrying traffic to and from client devices.
- control communications intended to be transferred via a robust control plane may include indicators that allow the system to recognize the special status of communications and transmit according to protocols established for the control plane.
- management software running above layer 2 at a particular node may generate control signals in the form of control plane packets for transmission to another node via a dedicated wireless channel (e.g., a backhaul).
- the generated control plane packets may include a marker of some type that allows lower level components (e.g., PHY hardware) to recognize the packets as control plane packets and transmit according to the protocols established for the control plane.
- the protocols established by the control plane for a multi-band wireless network may be configured for robust transfer of control data (i.e., low packet loss).
- data transmitted over the control plane can be transmitted at robust data rates, over multiple backhauls, using hybrid ARQ, using dedicated radios configured for robust data transmission, etc.
- Example protocols for the robust transmission of data over a control plane are described in more detail below.
- control plane can be implemented in firmware at one or more of the nodes forming the multi-band wireless network.
- control plane can be implemented in software.
- a control plane in accordance with the present teachings, can be implemented in and managed by software which runs above layer 1 and layer 2.
- FIG. 6A shows an example layer stack according to the OSI model in which the control plane is implemented, at least in part, by a software entity running in a convergent layer 602 a that is above the physical layer 604 a and data link layer 606 a .
- devices and systems that conform with the IEEE 1905.1 home network standard operate in a similar convergent layer. As shown in FIG.
- control communications are generated by the software entity running in the convergent layer 602 a , while the execution of protocols (e.g., robust data rates) to transmit the generated packets is managed at lower levels (e.g., the physical layer 604 a and/or data link layer 606 a ).
- FIG. 6B illustrates this concept in the context of a layer stack according to the TCP/IP model in which the control plane is implemented, at least in part, by a software entity in the form of a user management application 612 b running in the application layer 602 b . As shown in FIG.
- control communications (e.g., in the form of control plane packets) are generated by the management application 612 b running in the application layer 602 b , while the execution of protocols (e.g., robust data rates) to transmit the generated packets is managed at lower levels (e.g., the network interface layer 604 b and/or network layer 606 b ).
- protocols e.g., robust data rates
- FIGS. 6A and 6B provide illustrative examples of how a robust control plane may be implemented in the context of a network architecture, but are not to be construed as limiting. Other embodiments may implement a robust control plane using an alternative arrangement.
- step 406 managing the multi-band wireless network by wirelessly communicating data between the multiple nodes over the control plane according to the one or more protocols established by the control plane.
- One aspect of implementing a robust control plane may include identifying control plane data generated at higher levels (e.g., at a management application) for prioritized transmission at lower levels (e.g., PHY or MAC) according to one or more protocols established for the control plane (e.g., robust data rates, multiple backhauls, etc.). For example, a standard packet falling under the IEEE 1905.1 standard may be placed into a best effort queue for transmission to other devices. The best effort queue may be one of several queues implemented by a chipset at a given wireless networking device. If, a control plane packet is intended to be transmitted in a prioritized manner (e.g., through a best effort queue) the control plane packet can be marked to be recognized as a control plane packet by lower level components.
- a control plane packet is intended to be transmitted in a prioritized manner (e.g., through a best effort queue) the control plane packet can be marked to be recognized as a control plane packet by lower level components.
- control plane packets may be marked to, in effect, spoof lower level components (e.g., a processor at a wireless networking device) into treating the packets similar to other prioritized traffic.
- spoof lower level components e.g., a processor at a wireless networking device
- a control plane packet generated by a management application may be marked as a Wi-Fi beacon, a 1905.1 packet, a video packet, etc. to be handled in a prioritized manner by lower level components.
- a marker indicative of a status of a control plane packet may be included in the packet as any of a header appended to the control plane packet, a modification of an existing header of the control plane packet, and/or as information in a payload of the control plane packet.
- FIG. 7A shows a diagram illustrating communication between internal components at an example node 700 (e.g., similar to node 100 described with respect to FIG. 1 ) in the form of a Wi-Fi AP.
- the protocols for transmitting a given packet are executed at the hardware level by a processing unit such as central processing unit (CPU) 710 (e.g., similar to the processor 110 described with respect to FIG. 1 ).
- CPU central processing unit
- the CPU 710 is communicatively coupled, for example, to a Wi-Fi module 704 which may include or be coupled to a radio (e.g., any of a 2.4 GHz radio 102 , a 5 GHz low band radio 104 , a 5 GHz high band radio 106 , or sub 1-GHz radio 108 ) for wirelessly transmitting the data of the packet.
- a radio e.g., any of a 2.4 GHz radio 102 , a 5 GHz low band radio 104 , a 5 GHz high band radio 106 , or sub 1-GHz radio 108
- the CPU 702 may be communicatively coupled to the Wi-Fi module 704 via some type of internal bus 118 (e.g., PCIe).
- priority status of control plane packets can be mapped to Wireless Multi-Media (WMM) of the 802.11 standard where control plane packets are transmitted over a WLAN using Wi-Fi.
- WMM prioritizes traffic according to several access categories, namely voice, video, best effort, and background. WMM prioritizes voice and video over traffic from other applications that are less time critical. Accordingly, control plane packets can be marked as voice or video in order to prioritize the transmission of the control plane packets using WMM. In other words, using WMM may ensure that control plane packets marked as voice or video are inserted into higher priority queues and sent quicker than other packets.
- FIG. 7B shows an arrangement of an example frame 750 that may include a generated control plane packet.
- the control plane packet may comprise at least part of the payload portion 752 of the example frame 750 . As shown in FIG.
- the example frame may include a set of one or more headers such as a physical layer (PHY) header 754 , a data link layer (MAC) header 756 , and a transport layer (TX) header 758 .
- PHY physical layer
- MAC data link layer
- TX transport layer
- drivers at the node 700 may include their own associated headers designed for software at the CPU 710 to adjust operating parameters (e.g., data rate) by the Wi-Fi module 704 for a given packet which instruct a radio what to do with the packet.
- a control plane packet (e.g., generated by a software entity running above layer 2) may include a marker indicative of its status as a control plane packet.
- the control plane packet may be marked by appending and/or modifying any of a physical layer (PHY) header 754 , a data link layer (MAC) header 756 , or a transport layer (TX) header 758 , or by modifying the payload 752 .
- PHY physical layer
- MAC data link layer
- TX transport layer
- FIG. 8 is a flow chart of an example process 800 transmitting a control plane packet according to a protocol established for the control plane.
- example process 800 begins at step 802 with receiving a packet generated at a first node that is intended to be transmitted to a second node of a multi-band-wireless networking system.
- the packet is generated by a software entity (e.g., a management application) at the first node and is received at step 802 by a processor at the first node.
- the received packet may include some type of payload data to be transmitted (e.g., part of a message) as well as a marker indicative of a status of the generated packet as a control plane packet.
- the received packet is recognized as a control plane packet based on the marker associated with the packet.
- the marker may include an appended or modified header (e.g., PHY header, MAC header, TX header, etc.) or may be included in the payload.
- step 806 in response to recognizing the received packet as a control plane packet, the packet may be transmitted to the second node in accordance with the protocol established for the control plane.
- the control plane packet may be transmitted at any one or more of a robust data rate, over multiple backhauls, using hybrid ARQ, over a dedicated control channel, using a robust transport protocol, etc. These established protocols for robust transfer of control plane data are described in more detail later in the disclosure.
- step 806 may include causing by the processor the control plane packet to be transmitted by a chipset such as Wi-Fi module according to operating parameters that inform the radio what to do with the packet.
- step 806 may include at sub-step 807 , modifying (e.g., by the processor) the received control plane packet to transmit the packet in accordance with the protocol established for the control plane. In some embodiments, this modification may include further appending or modifying a header associated with the packet or modifying the payload of the packet.
- One or more steps of the example process 800 may be performed by any one or more of the components of the example processing systems described with respect to FIG. 1 or 12 .
- the process depicted in FIG. 8 may be represented in instructions stored in memory that are then executed by a processing unit.
- the process 800 described with respect to FIG. 8 is an example provided for illustrative purposes and is not to be construed as limiting. Other processes may include more or fewer steps than depicted while remaining within the scope of the present disclosure. Further, the steps depicted in example process 800 may be performed in a different order than is shown.
- a robust control plane may, in some embodiments, utilize protocols built into lower level components for the transmission of control plane packets in a robust manner.
- Wi-Fi hardware generally includes protocols for transmitting Wi-Fi beacons that provide a relative guarantee of delivery of the beacon.
- a Wi-Fi module may include hardware and/or drivers that may already be configured to transmit Wi-Fi beacons in a robust manner.
- control plane packets may be composed (e.g., by a management application) to mimic a Wi-Fi beacon to enable prioritized transmission.
- a management application at a first node may append the content of a Wi-Fi beacon to the generated control plane packet for transport with guaranteed delivery to a second node.
- the marker indicative of the status of the packet as a control plane packet may include, at least in part, the appended Wi-Fi beacon content. Some other maker may still be needed so that the control plane packet transmitted as a “fake” beacon is recognized as a control plane packet and not another Wi-Fi beacon upon receipt at the second node.
- a robust control plane may establish protocols that govern the rate at which control communication data is transferred. More specifically, control plane data generated at higher levels (e.g., in software at an application layer) may be marked to be transmitted at a particular data rate even though the data rates are actually managed at lower levels (e.g., network interface layer).
- robust data rates may be used that minimize packet loss. For example, a 10% packet error rate may be sufficient for file transfer but may lead to issues when communicating control data between nodes in a multi-band wireless network. Instead, depending on the implementation, a lower packet error rate (e.g., below 10%) may be necessary for effective control plane communications. For example, a particular embodiment may require a packet error rate as low as 0.1% to enable effective network management.
- Data rates may result in a lower packet error rate although this can depend on a number of other factors as well.
- Data rates may be expressed in a number of different ways such as bits per second and/or bits per symbol in the case of certain signal modulation techniques.
- QAM Quadrature Amplitude Modulation
- the transmission of control plane data may be set at 16 QAM (i.e., four bits per symbol) to achieve robust transmission results.
- a rate control can be implemented for control communications over a control plane.
- the data rate may be controlled to satisfy a specified criterion.
- a criterion based on packet error rate may be used, although criteria based on other metrics (e.g., bit error rate, expected transmission count, latency, etc.) may also be used.
- the data rate for control plane communications may be throttled to satisfy a specified criterion (e.g., at a or below a threshold packet error rate). In some situations, higher data rates may be tested on non-control plane packets first.
- FIG. 9 shows an example rate control process 900 for transmitting control plane data.
- example process 900 begins at step 902 with transmitting one or more non-control plane packets (e.g., standard backhaul traffic) at one or more initial data rates.
- the example process 900 continues at step 904 with monitoring packet error rates (or some other metric) for those transmitted non-control plane packets.
- the example process 900 continues at step 906 with identifying, based on the monitoring, a robust data rate that, for example, maximizes throughput (or some other performance metric) while remaining at or below a threshold packet error rate (or some other metric).
- the control plane packets are transmitted using the robust data rate identified at step 906 .
- the data rates may be capped for control plane communications despite observed success at higher rates to maintain sustainable robust communications.
- data rates for control communications may be capped at 16 QAM or 64 QAM modulation and/or may expressly exclude higher rates such as 256 QAM and 1024 QAM modulation.
- a robust control plane may establish protocols that govern replicated transmission of control plane data to mitigate the effects of lost packets. For example, in some embodiments copies of the same control plane packet may be transmitted multiple times over different bands (e.g., 2.4 GHz, 5 GHz low band, 5 GHz high band, etc.). In some embodiments, control plane packets for certain types of control communications (e.g., topology updates) may be transmitted on one band, while control plane packets other types of control communications (e.g., distributed router notifications) may be transmitted on another band. Copies of control plane packets may be tried over multiple wireless communication channels (e.g., a 2.4 GHz and 5 GHz channel, two different 5 GHz channels, a 2.4 GHz channel and two 5 GHz channels, etc. Copies of control plane packets may also be transmitted over multiple type of wireless and/or wired communication links (e.g., Wi-Fi, Bluetooth, Mocha, Power Line Communication (PLC), etc.).
- PLC Power Line Communication
- Hybrid ARQ generally refers to the combination of forward error correction (FEC) with automated repeat request (ARQ).
- Automated repeat request also referred to as automated repeat query
- FEC forward error correction
- ARQ automated repeat request
- Automated repeat request uses acknowledgements by a receiving entity that a piece of data (e.g., a packet) transmitted by a transmitting entity has been successfully received. If the acknowledgement from the receiving entity is not received by the transmitting entity within a certain period of time, the transmitting entity retransmits the piece of data.
- the transmitting entity additionally encodes the piece of data with an FEC code.
- This FEC code is transmitted automatically to the receiving entity or at the request of the receiving entity.
- the FEC code is then used to correct, if possible, any errors in the piece of data introduced during the transmission process, while the ARQ process described above is used as a fall-back position if any introduced errors are not correctable. Note that implementation of hybrid ARQ in a wireless networking device that does not natively support this process may require modification to hardware level components.
- FIG. 10 shows a diagram of an example transmission of a control plane packet using hybrid ARQ.
- a control plane packet(s) 1002 is received by a transmitting entity 1010 .
- the transmitting entity may comprise or include the hardware level network interface components at a transmitting node in a multi-band wireless network.
- the control plane packet 1002 may be received from higher level software entity (e.g., in the application layer or convergent layer).
- An FEC encoder 1012 encodes the data in the received control plane packet(s) 1002 to generate an FEC code that is then transmitted by the transmitting entity 1010 along with the control plane packet(s) 1002 to a receiving entity 1020 .
- the receiving entity 1020 may comprise or include the hardware level network interface components at a receiving node in a multi-band wireless network.
- the FEC Decoder 1022 decodes the transmitted FEC code and an ARQ module 1024 transmits an acknowledgement (ACK) message to the transmitting entity 1010 . If any detected transmission errors are not correctable though decoding of the FEC code, the ARQ module 1024 will transmit a non-acknowledgement (NACK) message to the transmitting entity 1010 which then determines, based on the received NACK message, if the control plane packet(s) 1002 should be retransmitted in whole or at least in part.
- NACK non-acknowledgement
- the NACK message may state that most of the data in the transmitted control plane packet(s) 1002 were received without issue, but that there are a few corrupted bits.
- the transmitting entity 1010 may thereby elect to encode and re-transmit the corrupted bits.
- a robust control plane may establish protocols that utilize a dedicated channel (i.e., outside of the standard backhaul) for some or all control plane communications.
- nodes in a multi-band wireless networking system may include additional radios that operate in frequencies outside of those used for fronthaul communications (e.g., 2.4 GHz and or 5 GHz low band) and standard backhaul communications (e.g., 5 GHz high band).
- a node 100 may include one or more sub-1 GHz radios 108 dedicated for transmitting and receiving control plane communications. More specifically, the one or more sub-1 GHz radios 108 may operate at frequencies between 433 MHz through 928 MHz. Within this range are two regulated industrial, scientific, and medical (ISM) bands.
- ISM industrial, scientific, and medical
- the 433 MHz band and the 900 MHz band are casually referred to as the 433 MHz band and the 900 MHz band. These bands actually range between 433.05 MHz-434.79 MHz and 902 MHz-928 Mhz. This frequency range typically has significantly less use than the 2.4 GHz band or the 5 GHz band since fewer devices operate in the 433-928 MHz range.
- One reason for the comparative non-use is that the 433-928 MHz frequency range carries less information (i.e., lower data rate) due to the significantly longer wavelengths (more time passes for the electromagnetic radiation to cycle through the period of each wavelength of data).
- the other result of the greater wavelength is that communications have much longer ranges than bands used in other radios at the same power (often reaching over a mile). In the context of control plane communications which generally involve little data but require higher reliability, the tradeoffs are beneficial.
- a dedicated control channel (e.g., in the 433-928 MHz range) may be used for all control plane communications between nodes in a multi-band wireless networking system.
- use of a dedicated control channel may be limited to a particular subset of control plane communications.
- use of a dedicated control channel may be limited to the transfer of control plane communications deemed critical in some respect.
- Critical communications may include those communications that enable consensus between nodes in the multi-band wireless networking system and thereby allow the system to operate effectively.
- critical control communications may include, for example, timing synchronization, roaming coordination, provisioning of new nodes as APs, etc.
- control plane packet (e.g., generated by a management application at a given node) may further include a marker indicative of a priority status (e.g., critical/non-critical) in addition to a marker indicative of a status as a control plane packet.
- a priority status e.g., critical/non-critical
- a robust control plane may establish the use of transport protocols configured for low latency and guaranteed delivery.
- Data transmission at the transport layer typically employs one of two types of transport protocols: the Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP).
- TCP Transmission Control Protocol
- UDP User Datagram Protocol
- UDP typically used in applications such as voice over IP, typically results in lower latency, but has no guarantee of delivery. In other words, lost packets may be simply ignored so as not to delay the overall transmission.
- TCP Transmission Control Protocol
- UDP User Datagram Protocol
- TCP Transmission Control Protocol
- UDP User Datagram Protocol
- TCP Transmission Control Protocol
- UDP User Datagram Protocol
- TCP Transmission Control Protocol
- UDP User Datagram Protocol
- TCP guarantees delivery, but introduces latency. Again, such latency, in the context of control communications, may impact the effective operation of a multi-band wireless networking system.
- alternative transport protocols may be used for transmitting control plane data.
- some embodiments may utilize a real-time transport protocol (RTP) such as the RTP Control Protocol (RTCP).
- RTP real-time transport protocol
- RTCP is typically used for video control transport but is designed for low latency with guarantee of delivery.
- certain control communications e.g., to pause the video
- control plane communications used to communicate control messages between nodes in a multi-band wireless networking system may be transmitted using some variation on RTCP or a proprietary transport protocol configured around similar goals (i.e., low latency, guarantee of delivery).
- MQTT Message Queuing Telemetry Transport
- MQTT is a lightweight messaging protocol designed for unreliable networks and as result helps to send packets over wireless backhaul which have packet loss.
- the design principles for MQTT effectively minimize network bandwidth usage while attempting to increase reliability and of assurance of delivery.
- MQTT includes the three levels of Quality of Service.
- QoS 0 ensures delivery at most once.
- QoS 1 ensures delivery at least once.
- QoS 2 ensures delivery exactly once.
- QoS 1 and QoS 2 may be used for management frames, however the level of QoS utilized when implementing MQTT as a transport protocol will depend on requirements of the network.
- QoS 1 ensures that a message arrives at the receiver at least once. Under QoS 1, the receiver may also receive the same message multiple times and therefore may need to implement logic to handle duplicate messages (e.g., using sequence numbers or time stamps).
- QoS 0 does not guarantee delivery of messages and so QoS 0 may not be good option for robust control.
- QoS 2 delivers the highest quality of service without loss and without duplication of messages, but has an increased overhead which slows down transfer and so may not be work for control messages in some situations.
- WebSocket may also be used as a protocol to send control plane data.
- WebSocket is a protocol providing full-duplex communication channels over a single TCP connection. TCP adds delay in the presence of packet loss and is therefore not ideal for low latency, however TCP works is reliable for communicating messages.
- WebSocket may be used as a secondary robust way to send updates that are also sent using a lower latency but less reliable protocol.
- WebSocket enables interaction between a web client (e.g., a browser) and a web server with lower overhead thereby facilitating real-time data transfer with the server.
- Websocket provides a standardized way for a server to send content to a client without first receiving a request from by the client. WebSocket also allows messages to be passed back and forth while keeping the connection open. Such features of Websocket can assist in sending control packets between two different APs without one of the APs requesting an update from the other AP.
- a single node of a multi-band wireless networking system provides router functionality for the system.
- this router node relies on up-to-date information from the multiple satellite nodes. Delays in receiving this information can result in interrupted service to client devices. To avoid such delays, certain router functions can instead be distributed among the multiple nodes of a multi-band wireless networking system.
- FIG. 11A shows an example wireless networking system 1100 that includes distributed dynamic host configuration protocol (DHCP) functionality.
- the example system 1100 includes a router node 1102 and multiple satellite nodes 1104 a - d that collectively provide broad wireless coverage to a client device 1130 .
- the base router node 1102 in this example provides the connection to the Internet 1160 .
- the allocation of IP addresses to connecting client devices would be handled by a centralized DHCP server operating at the router node 1102 .
- a client device attempting to connect to one of the satellite nodes 1104 a - c would request an IP address assignment which would then need to be communicated to the centralized DHCP server operating at the router node 1102 .
- a successful connection of the client device 1130 to the wireless network would rely on the communication of the request to the router node 1102 , the successful assignment by the centralized DHCP server at the router node 1102 , and communication of that assignment back to the satellite node to which the client 1130 was connected.
- DHCP functionality can be distributed across multiple nodes in a given system.
- the DHCP server is distributed across the router node 1102 and the multiple satellite nodes 1104 a - d .
- a distributed router agent in the form of a DHCP agent 1103 operates at router node 1102 with DHCP agents 1105 a - d operating at satellite nodes 1104 a - d (respectively).
- control communications between the multiple nodes are used to coordinate the various DHCP agents of the distributed DHCP server to dynamically assign IP addresses and maintain knowledge of these assignments during client roaming.
- the control communications over which this coordination is performed are part of a robust control plane described in more detail above.
- FIG. 11B shows another embodiment of the network system 1100 of FIG. 11A , in which a DNS server is distributed across multiple nodes. Specifically, as shown in FIG. 11B , a DNS agent 1113 operates at router node 1102 with DNS agents 1115 a - d operating at satellite nodes 1104 a - d (respectively).
- DNS domain name server
- FIG. 11C is a diagram of the example system 1100 illustrating an example process for allocating IP address ranges in a wireless networking system with distributed DHCP functionality.
- the DHCP agent 1103 at the router node 1102 initially allocates a range of IP addresses to each of a plurality of distributed DHCP agents 1105 a - d at satellite nodes 1104 a - d (respectively). This allocation may be performed using control communications, for example, transmitted over a robust control plane, as previously described. For example, as shown in FIG.
- DHCP 1103 has allocated a first range of assignable IP addresses to DHCP agent 105 a , a second range to DHCP agent 1105 b , a third range to DHCP agent 1105 c , and a fourth range to DHCP agent 1105 d .
- the ranges distributed to each node may include an equal number of IP addresses split among the number of nodes in the system. Alternatively, the allocation of IP ranges may differ from node to node and be based on any number of factors such as historical needs, type of node, traffic conditions, etc.
- the allocated ranges at a given node may remain allocated until assigned or released by the DHCP agent at that node or may be dynamically de-allocated by DHCP 1103 , for example to respond to request for additional allocations from DHCP agents at other nodes.
- the DHCP allocations and individual assignments may tracked in one or more tables stored at and synchronized among the multiple nodes 1102 and 1104 a - d .
- each satellite node may be informed not only of the range of IP addresses that it has been allocated, but of the IP range allocations for all the other nodes in the network. Further, as will be described with respect to FIG. 11D , each of the nodes may similarly be informed of individual IP assignments to connected devices
- FIG. 11D is a diagram of the example system 1100 illustrating an example process for assigning an IP address to a joining client device in a wireless networking system with distributed DHCP functionality.
- the scenario depicted in FIG. 11D assumes that IP address ranges were previously allocated, by DHCP agent 1103 at router node 1102 , to each of the DHCP agents 1105 a - d at satellite nodes 1104 a - d (respectively), for example, as described with respect to FIG. 11C .
- FIG. 11D assumes that IP address ranges were previously allocated, by DHCP agent 1103 at router node 1102 , to each of the DHCP agents 1105 a - d at satellite nodes 1104 a - d (respectively), for example, as described with respect to FIG. 11C .
- FIG. 11D assumes that IP address ranges were previously allocated, by DHCP agent 1103 at router node 1102 , to each of the DHCP agents 1105 a -
- a client device 1130 attempting to join the network 1100 submits a DHCP request to a DHCP agent at one of the satellite nodes, in this case, DHCP agent 1104 d at satellite node 1104 d .
- the DHCP agent 1104 d at satellite node 1104 d assigns a free IP address including its allocated IP address range to the client device 1130 .
- the DHCP agent 1104 d transmits a notification to one or more of the other DHCP agents forming the distributed DHCP server informing them of the IP address assignment to client device 1130 .
- Such notification may be performed using control communications, for example, transmitted over a robust control plane, as previously described.
- information regarding the IP address assignment e.g., the IP address, identifiers associated with the client device 130 , time stamp information, etc.
- FIG. 11E is a diagram of the example system 1100 illustrating an example process for retaining assignment of an IP address for a client device roaming through a wireless networking system with distributed DHCP functionality.
- the scenario depicted in FIG. 11E assumes that IP address ranges were previously allocated, by DHCP agent 1103 at router node 1102 , to each of the DHCP agents 1105 a - d at satellite nodes 1104 a - d (respectively), for example, as described with respect to FIG. 11C .
- the scenario depicted in FIG. 11D further assumes that the DHCP agent 1105 d of satellite node 1104 d previously assigned an IP address to client device 1130 d , for example, as described with respect to FIG. X4 .
- client device 1130 is handed off from satellite node 1104 d to satellite node 1104 c in response to roaming by client device 1130 .
- the DHCP module 1105 d previously informed the other DHCP agents of the IP address assigned to client device 130 .
- DHCP agent 1105 c has knowledge of the assignment of a particular IP address to client device 1130 .
- the DHCP agent 105 c may access a table with data associating the previously assigned IP address to client device 1130 .
- the IP address may be associated with some type of identifier associated with the client device 1130 (e.g., a MAC address, UUID, account username, etc.).
- a MAC address e.g., a MAC address, UUID, account username, etc.
- the DHCP agent 1105 c identifies the IP address matching any identifying information associated with the client device 1130 and proceeds to assign that same IP address to the client device 1130 .
- the DHCP agent 1105 c may transmit a notification to one or more of the other DHCP agents forming the distributed DHCP server informing them of the IP address reassignment to client device 1130 as well as the hand-off from satellite node 1104 d to satellite node 1104 c .
- notification may be performed using control communications, for example, transmitted over a robust control plane, as previously described.
- FIG. 11F is a diagram illustrating an example process for disconnecting a client device from a wireless networking system with distributed DHCP functionality.
- the scenario depicted in FIG. 11F assumes that IP address ranges were previously allocated, by DHCP agent 1103 at router node 1102 , to each of the DHCP agents 1105 a - d at satellite nodes 1104 a - d (respectively), for example, as described with respect to FIG. 11C .
- the scenario depicted in FIG. 11D further assumes that the DHCP agent 1105 d of satellite node 1104 d previously assigned an IP address to client device 1130 d , for example, as described with respect to FIG. 11D .
- FIG. 11F assumes that IP address ranges were previously allocated, by DHCP agent 1103 at router node 1102 , to each of the DHCP agents 1105 a - d at satellite nodes 1104 a - d (respectively), for example, as described with respect to FIG.
- the DHCP agent 1105 d of satellite node 1104 d transmits a notification to one or more of the other DHCP agents forming the distributed DHCP server informing them that the previously IP address previously assigned to client device 1130 has been released.
- Such notification may be performed using control communications, for example, transmitted over a robust control plane, as previously described.
- the other DHCP modules may store information associated with the notification in one or more tables that are synchronized across the distributed DHCP server.
- the now released IP address would remain allocated to DHCP agent 1105 d of satellite node 1104 d to be assigned at a later time to another client device. In other embodiments, the now released IP address may be revert to the DHCP agent 1103 of the router node 1102 to be allocated to a DHCP module of another satellite node.
- FIG. 12 is a block diagram illustrating an example of a processing system 1200 in which at least some operations described in this disclosure can be implemented.
- the processing system 1200 may include one or more central processing units (“processors”) 1202 , main memory 1206 , non-volatile memory 1210 , network adapter 1212 (e.g., network interfaces), display 1218 , input/output devices 1220 , control device 1222 (e.g., keyboard and pointing devices), drive unit 1224 including a storage medium 1226 , and signal generation device 1230 that are communicatively connected to a bus 1216 .
- the bus 1216 is illustrated as an abstraction that represents any one or more separate physical buses, point to point connections, or both connected by appropriate bridges, adapters, or controllers.
- the bus 1216 can include, for example, a system bus, a Peripheral Component Interconnect (PCI) bus or PCI-Express bus, a HyperTransport or industry standard architecture (ISA) bus, a small computer system interface (SCSI) bus, a universal serial bus (USB), IIC (I2C) bus, or an Institute of Electrical and Electronics Engineers (IEEE) standard 1394 bus, also called “Firewire.”
- PCI Peripheral Component Interconnect
- ISA HyperTransport or industry standard architecture
- SCSI small computer system interface
- USB universal serial bus
- I2C IIC
- IEEE Institute of Electrical and Electronics Engineers
- the processing system 1200 may be a server computer, a client computer, a personal computer (PC), a user device, a tablet PC, a laptop computer, a personal digital assistant (PDA), a cellular telephone, an iPhone, an iPad, a Blackberry, a processor, a telephone, a web appliance, a network router, switch or bridge, a console, a hand-held console, a (hand-held) gaming device, a music player, any portable, mobile, hand-held device, or any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by the computing system.
- PC personal computer
- PDA personal digital assistant
- main memory 1206 non-volatile memory 1210 , and storage medium 1226 (also called a “machine-readable medium) are shown to be a single medium, the term “machine-readable medium” and “storage medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store one or more sets of instructions 1228 .
- the term “machine-readable medium” and “storage medium” shall also be taken to include any medium that is capable of storing, encoding, or carrying a set of instructions for execution by the computing system and that cause the computing system to perform any one or more of the methodologies of the presently disclosed embodiments.
- routines executed to implement the embodiments of the disclosure may be implemented as part of an operating system or a specific application, component, program, object, module, or sequence of instructions referred to as “computer programs.”
- the computer programs typically comprise one or more instructions (e.g., instructions 1204 , 1208 , 1228 ) set at various times in various memory and storage devices in a computer, and that, when read and executed by one or more processing units or processors 1202 , cause the processing system 1200 to perform operations to execute elements involving the various aspects of the disclosure.
- machine-readable storage media such as volatile and non-volatile memory devices 1610 , floppy and other removable disks, hard disk drives, optical disks (e.g., Compact Disk Read-Only Memory (CD ROMS), Digital Versatile Disks (DVDs)), and transmission type media such as digital and analog communication links.
- recordable type media such as volatile and non-volatile memory devices 1610 , floppy and other removable disks, hard disk drives, optical disks (e.g., Compact Disk Read-Only Memory (CD ROMS), Digital Versatile Disks (DVDs)
- CD ROMS Compact Disk Read-Only Memory
- DVDs Digital Versatile Disks
- the network adapter 1212 enables the processing system 1200 to mediate data in a network 1214 with an entity that is external to the processing system 1200 , such as a network appliance, through any known and/or convenient communications protocol supported by the processing system 1200 and the external entity.
- the network adapter 1212 can include one or more of a network adaptor card, a wireless network interface card, a router, an AP, a wireless router, a switch, a multilayer switch, a protocol converter, a gateway, a bridge, bridge router, a hub, a digital media receiver, and/or a repeater.
- the network adapter 1212 can include a firewall which can, in some embodiments, govern and/or manage permission to access/proxy data in a computer network, and track varying levels of trust between different machines and/or applications.
- the firewall can be any number of modules having any combination of hardware and/or software components able to enforce a predetermined set of access rights between a particular set of machines and applications, machines and machines, and/or applications and applications, for example, to regulate the flow of traffic and resource sharing between these varying entities.
- the firewall may additionally manage and/or have access to an access control list which details permissions including, for example, the access and operation rights of an object by an individual, a machine, and/or an application, and the circumstances under which the permission rights stand.
- programmable circuitry e.g., one or more microprocessors
- software and/or firmware entirely in special-purpose hardwired (i.e., non-programmable) circuitry, or in a combination or such forms.
- Special-purpose circuitry can be in the form of, for example, one or more application-specific integrated circuits (ASICs), programmable logic devices (PLDs), field-programmable gate arrays (FPGAs), etc.
- ASICs application-specific integrated circuits
- PLDs programmable logic devices
- FPGAs field-programmable gate arrays
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Quality & Reliability (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (37)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/954,411 US10986626B2 (en) | 2017-04-21 | 2018-04-16 | Robust control plane for management of a multi-band wireless networking system |
CN201810370089.9A CN108738047A (en) | 2017-04-21 | 2018-04-23 | Robust control plane for multi-band wireless network system management |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201762488258P | 2017-04-21 | 2017-04-21 | |
US15/954,411 US10986626B2 (en) | 2017-04-21 | 2018-04-16 | Robust control plane for management of a multi-band wireless networking system |
Publications (2)
Publication Number | Publication Date |
---|---|
US20180310221A1 US20180310221A1 (en) | 2018-10-25 |
US10986626B2 true US10986626B2 (en) | 2021-04-20 |
Family
ID=63854287
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/842,609 Active 2038-04-06 US11229023B2 (en) | 2017-04-21 | 2017-12-14 | Secure communication in network access points |
US15/853,547 Active US10999834B2 (en) | 2017-04-21 | 2017-12-22 | Method and apparatus for generating and maintaining an accurate network map in a communications network |
US15/952,995 Active 2038-06-23 US10798702B2 (en) | 2017-04-21 | 2018-04-13 | Periodic frames for control plane data to manage multi-band wireless networking system |
US15/954,411 Active 2039-05-29 US10986626B2 (en) | 2017-04-21 | 2018-04-16 | Robust control plane for management of a multi-band wireless networking system |
Family Applications Before (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/842,609 Active 2038-04-06 US11229023B2 (en) | 2017-04-21 | 2017-12-14 | Secure communication in network access points |
US15/853,547 Active US10999834B2 (en) | 2017-04-21 | 2017-12-22 | Method and apparatus for generating and maintaining an accurate network map in a communications network |
US15/952,995 Active 2038-06-23 US10798702B2 (en) | 2017-04-21 | 2018-04-13 | Periodic frames for control plane data to manage multi-band wireless networking system |
Country Status (2)
Country | Link |
---|---|
US (4) | US11229023B2 (en) |
CN (4) | CN108738047A (en) |
Families Citing this family (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10638318B2 (en) * | 2016-10-10 | 2020-04-28 | Nec Corporation | Optical chaos based wireless device fingerprinting |
US11229023B2 (en) * | 2017-04-21 | 2022-01-18 | Netgear, Inc. | Secure communication in network access points |
US10785197B2 (en) * | 2017-11-21 | 2020-09-22 | Jose Luis Merino Gonzalez | System and method for distributed internet sharing |
US11122500B2 (en) * | 2018-01-16 | 2021-09-14 | Cisco Technology, Inc. | Using a blockchain for optimized fast-secure roaming on WLANs |
US10798613B2 (en) * | 2018-08-03 | 2020-10-06 | Qualcomm Incorporated | Traffic separation in a controller based multi-AP network |
US20210385152A1 (en) | 2018-08-24 | 2021-12-09 | Signify Holding B.V. | A method of and a node device for application data exchange |
US10771331B2 (en) * | 2018-11-07 | 2020-09-08 | Cisco Technology, Inc. | Closed loop control for fixing network configuration issues to aid in device classification |
CN111258599B (en) * | 2018-12-03 | 2023-06-20 | 中国电信股份有限公司 | Firmware upgrade method, system and computer readable storage medium |
WO2020154432A1 (en) | 2019-01-22 | 2020-07-30 | Trellisware Technologies, Inc. | Controlling data communication quality in software-defined heterogenous multi-hop ad hoc networks |
US11689918B2 (en) | 2019-03-01 | 2023-06-27 | Hewlett Packard Enterprise Development Lp | Remote access point clustering for user authentication in wireless networks |
US10896412B2 (en) | 2019-03-12 | 2021-01-19 | Airtime Network, Inc. | Trustless physical cryptocurrency |
KR20200113669A (en) * | 2019-03-26 | 2020-10-07 | 엘지전자 주식회사 | A method of transmitting and receiving wireless communication signal and an apparatus for transmitting and receiving wireless communication signal |
CN110430573A (en) * | 2019-07-31 | 2019-11-08 | 维沃移动通信有限公司 | A kind of information authentication method, electronic equipment and network side equipment |
US11343244B2 (en) * | 2019-08-02 | 2022-05-24 | Dell Products, Lp | Method and apparatus for multi-factor verification of a computing device location within a preset geographic area |
EP4018597A4 (en) * | 2019-08-22 | 2023-04-12 | Quantumciel Pte. Ltd. | Device, system and method for providing information security |
CN111132160B (en) * | 2019-12-06 | 2023-06-30 | 深圳市锐同技术有限公司 | Route management method, terminal access method and wireless access system |
CN111200500B (en) * | 2019-12-19 | 2022-07-01 | 广西大学 | Satellite management method based on block chain and physical unclonable function |
US11700146B2 (en) * | 2020-08-26 | 2023-07-11 | Microchip Technology Incorporated | EMI reduction in PLCA-based networks through beacon temporal spreading |
CN112887974B (en) * | 2021-01-23 | 2022-02-11 | 深圳市智开科技有限公司 | Management frame protection method for WAPI wireless network |
US11792718B2 (en) * | 2021-02-22 | 2023-10-17 | Hewlett Packard Enterprise Development Lp | Authentication chaining in micro branch deployment |
CN113316145B (en) * | 2021-05-21 | 2022-12-16 | 中国联合网络通信集团有限公司 | Wireless network access method, wireless access equipment and terminal equipment |
US11962567B2 (en) * | 2021-05-27 | 2024-04-16 | Cisco Technology, Inc. | Address rotation aware dynamic host control protocol |
CN116346945A (en) * | 2021-12-24 | 2023-06-27 | 戴尔产品有限公司 | Trusted network protocol proxy implemented via intelligent network interface controller |
US11915065B2 (en) | 2022-01-20 | 2024-02-27 | Vmware, Inc. | Brokerless reliable totally ordered many-to-many interprocess communication on a single node that uses shared memory and multicast |
US20230319650A1 (en) * | 2022-03-31 | 2023-10-05 | Fortinet, Inc. | System & methods for reducing delay in bss fast transitions between access points on wi-fi wireless networks using opportunistic key generation to prevent key failure |
US20230354150A1 (en) * | 2022-04-28 | 2023-11-02 | At&T Intellectual Property I, L.P. | Multifrequency configuration and management for new radio-based smart repeaters |
CN115580577B (en) * | 2022-09-23 | 2024-07-02 | 华北电力大学 | Intelligent park multi-state routing protocol optimization method based on time synchronization perception |
Citations (99)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010002486A1 (en) | 1998-01-02 | 2001-05-31 | Cryptography Research, Inc. | Leak-resistant cryptographic method and apparatus |
CN1416232A (en) | 2001-10-31 | 2003-05-07 | 华为技术有限公司 | Method for controlling service priority for tunneling data packet in general packet wireless service |
US20040117626A1 (en) | 2003-09-12 | 2004-06-17 | Pioneer Research Center Usa, Inc. | Key exchange based on dsa type certificates |
US20040218683A1 (en) | 2003-05-01 | 2004-11-04 | Texas Instruments Incorporated | Multi-mode wireless devices having reduced-mode receivers |
US20050233693A1 (en) | 2004-04-16 | 2005-10-20 | Jeyhan Karaoguz | Over the air programming via a broadband access gateway |
US20070064609A1 (en) * | 2005-09-06 | 2007-03-22 | Sony Corporation | Communication processing apparatus, communication control method and computer program |
CN1987798A (en) | 2006-12-08 | 2007-06-27 | 杭州华为三康技术有限公司 | Communication method between data plane and control plane |
US20080065816A1 (en) | 2006-09-07 | 2008-03-13 | Samsung Electronics Co., Ltd. | Firmware update method for mobile terminal and mobile terminal using the same |
US20080076393A1 (en) | 2006-09-22 | 2008-03-27 | Amit Khetawat | Method and apparatus for securing communication between an access point and a network controller |
US20080076392A1 (en) | 2006-09-22 | 2008-03-27 | Amit Khetawat | Method and apparatus for securing a wireless air interface |
US20080076412A1 (en) | 2006-09-22 | 2008-03-27 | Amit Khetawat | Method and apparatus for registering an access point |
US20080080414A1 (en) | 2006-10-02 | 2008-04-03 | Pascal Thubert | Backhaul-level call admission control for a wireless mesh network |
CN101442402A (en) | 2007-11-20 | 2009-05-27 | 华为技术有限公司 | Method, system and apparatus for authenticating access point equipment |
US20090165086A1 (en) | 2007-12-21 | 2009-06-25 | Spansion Llc | Random number generation through use of memory cell activity |
US20090214036A1 (en) | 2008-02-22 | 2009-08-27 | Microsoft Corporation | Authentication mechanisms for wireless networks |
US7606175B1 (en) | 2005-04-15 | 2009-10-20 | Nvidia Corporation | Extended service set mesh path selection |
US20090320110A1 (en) | 2008-06-23 | 2009-12-24 | Nicolson Kenneth Alexander | Secure boot with optional components method |
US7668128B1 (en) | 2004-05-17 | 2010-02-23 | Avaya Inc. | Features of power save in 802.11e wireless local area networks (WLANs) |
US20100135201A1 (en) | 2008-12-03 | 2010-06-03 | At&T Mobility Ii Llc | Registration notification for mobile device management |
US20100182959A1 (en) | 2009-01-22 | 2010-07-22 | Qwest Communications Internationl Inc. | SIMULTANEOUS MULTI-MODE WiFi DIFFERENTIATED BY SSID |
US20100190457A1 (en) * | 2009-01-23 | 2010-07-29 | Yung-Szu Tu | Approximation method for signal-to-noise ratio soft information for a communications system |
US20110010543A1 (en) | 2009-03-06 | 2011-01-13 | Interdigital Patent Holdings, Inc. | Platform validation and management of wireless devices |
US20110041003A1 (en) | 2009-03-05 | 2011-02-17 | Interdigital Patent Holdings, Inc. | METHOD AND APPARATUS FOR H(e)NB INTEGRITY VERIFICATION AND VALIDATION |
US20110087887A1 (en) | 2009-10-09 | 2011-04-14 | Achim Luft | Methods and apparatus for digital attestation |
US20110173457A1 (en) | 2009-08-14 | 2011-07-14 | Jeffrey Reh | Enhanced security for over the air (ota) firmware changes |
CN102291794A (en) | 2011-09-27 | 2011-12-21 | 杭州华三通信技术有限公司 | Channel switching method and equipment in MESH network |
US20120005369A1 (en) | 2010-07-02 | 2012-01-05 | Netgear, Inc. | System and method of tcp tunneling |
US20120005480A1 (en) | 2010-07-01 | 2012-01-05 | Rockwell Automation Technologies, Inc. | Methods for firmware signature |
US8214653B1 (en) | 2009-09-04 | 2012-07-03 | Amazon Technologies, Inc. | Secured firmware updates |
US8259682B2 (en) | 2005-02-04 | 2012-09-04 | Toshiba America Research, Inc. | Framework of media-independent pre-authentication |
CN103067095A (en) | 2013-01-30 | 2013-04-24 | 北京全路通信信号研究设计院有限公司 | Multi-band WIFI (wireless fidelity) parallel transmission scheme based on waveguide tube transmission medium |
CN103167631A (en) | 2013-03-27 | 2013-06-19 | 杭州华三通信技术有限公司 | Mesh aggregation link establishing method and device |
US20130185563A1 (en) | 2012-01-12 | 2013-07-18 | Gueorgui Djabarov | Multiple System Images for Over-The-Air Updates |
US20130198838A1 (en) | 2010-03-05 | 2013-08-01 | Interdigital Patent Holdings, Inc. | Method and apparatus for providing security to devices |
US20130268689A1 (en) | 2012-04-10 | 2013-10-10 | Intel Mobile Communications GmbH | Data processing device |
CN103460666A (en) | 2011-03-29 | 2013-12-18 | 日本电气株式会社 | Network system and method for acquiring VLAN tag information |
US20140006787A1 (en) | 2012-06-28 | 2014-01-02 | Qualcomm Incorporated | Method and apparatus for restricting access to a wireless system |
CN103648109A (en) | 2013-12-09 | 2014-03-19 | 成都飞鱼星科技开发有限公司 | Wireless distributed forwarding system and method thereof |
US20140119303A1 (en) | 2012-10-30 | 2014-05-01 | Electronics And Telecommunications Research Institute | Operating method of access point (ap) and station for coexistence of basic service sets having different bandwidths |
US20140123124A1 (en) | 2012-10-31 | 2014-05-01 | Aruba Networks, Inc. | Cloud-based firmware distribution service |
US20140192785A1 (en) | 2011-09-30 | 2014-07-10 | Michelle X. Gong | Mitigating overlapping basic service set interference in smart grid networks |
US20150071307A1 (en) * | 2013-09-12 | 2015-03-12 | Nvidia Corporation | Communication interface and method for robust header compression of data flows |
CN104796355A (en) | 2008-01-10 | 2015-07-22 | 苹果公司 | Apparatus and methods for network resource allocation |
US20150245182A1 (en) | 2014-02-25 | 2015-08-27 | Cambridge Silicon Radio Limited | Update management |
US20150261521A1 (en) | 2014-03-11 | 2015-09-17 | Hyuksang CHOI | Mobile system including firmware verification function and firmware update method thereof |
US20150271017A1 (en) | 2014-03-23 | 2015-09-24 | Avaya Inc. | Configuration of networks using switch device access of remote server |
CN104955102A (en) | 2014-03-24 | 2015-09-30 | 网件公司 | Multi-band wireless station having multiple radios in one band |
CN105050081A (en) | 2015-08-19 | 2015-11-11 | 腾讯科技(深圳)有限公司 | Method, device and system for connecting network access device to wireless network access point |
US20150363576A1 (en) | 2014-06-11 | 2015-12-17 | Arris Enterprises, Inc. | Restricted Code Signing |
US20150382328A1 (en) * | 2013-02-06 | 2015-12-31 | China Mobile Communications Corporation | Method and device for indicating modulation and coding scheme, and method and device for receiving downlink data |
US20160029356A1 (en) | 2014-07-25 | 2016-01-28 | Aruba Networks, Inc. | Dynamic user-configurable information element |
US20160036814A1 (en) | 2014-07-30 | 2016-02-04 | Master Lock Company Llc | Wireless firmware updates |
US20160036956A1 (en) | 2014-07-30 | 2016-02-04 | Google Technology Holdings LLC | Contextually updating wireless device firmware |
US20160119052A1 (en) | 2014-10-27 | 2016-04-28 | At&T Intellectual Property I, L.P. | Techniques for In-Flight Connectivity |
US20160198350A1 (en) | 2013-07-03 | 2016-07-07 | Interdigital Patent Holdings, Inc. | Multi-band methods for interference limited wireless local area network systems |
US20160212745A1 (en) | 2015-01-21 | 2016-07-21 | Telefonaktiebolaget L M Ericsson (Publ) | Wireless Local Area Network Access Points |
US20160227440A1 (en) | 2015-01-30 | 2016-08-04 | Nokia Solutions And Networks Oy | Controlling LTE/Wi-Fi Aggregation |
US20160262160A1 (en) * | 2015-03-03 | 2016-09-08 | Comcast Cable Communications, Llc | Dynamic adaptive network |
US20160262163A1 (en) | 2013-10-15 | 2016-09-08 | Aoife Solutions, S.L. | System and method for decentralized control of wireless networks |
US20160280370A1 (en) | 2015-03-27 | 2016-09-29 | Amazon Technologies, Inc. | Influencing acceptance of messages in unmanned vehicles |
US20160294829A1 (en) | 2015-04-02 | 2016-10-06 | The Boeing Company | Secure provisioning of devices for manufacturing and maintenance |
WO2016162763A1 (en) | 2015-04-10 | 2016-10-13 | Telefonaktiebolaget Lm Ericsson (Publ) | System and method to support inter-wireless local area network communication by a radio access network |
US20160301566A1 (en) * | 2015-04-10 | 2016-10-13 | Comcast Cable Communications, Llc | Virtual gateway control and management |
CN106102074A (en) | 2016-08-11 | 2016-11-09 | 山东奥联信息科技有限公司 | Express highway all-way is wireless WIFI covering system |
US20160366229A1 (en) | 2015-06-09 | 2016-12-15 | Kabushiki Kaisha Toshiba | Communication device, communication system, and computer program product |
US9525759B2 (en) | 2008-09-29 | 2016-12-20 | Marvell World Trade Ltd. | Physical layer data unit format |
US20170026966A1 (en) | 2010-08-26 | 2017-01-26 | Thomson Licensing | White space usage for wireless local area network devices |
US20170086152A1 (en) * | 2015-09-17 | 2017-03-23 | Qualcomm Incorporated | Listen-before-talk mechanism |
US20170090909A1 (en) | 2015-09-25 | 2017-03-30 | Qualcomm Incorporated | Secure patch updates for programmable memories |
US20170093800A1 (en) | 2015-09-26 | 2017-03-30 | Intel Corporation | Data protection keys |
US20170093645A1 (en) | 2015-09-21 | 2017-03-30 | Splunk Inc. | Displaying Interactive Topology Maps Of Cloud Computing Resources |
US20170104580A1 (en) | 2015-10-12 | 2017-04-13 | Microsoft Technology Licensing, Llc | Migrating secrets using hardware roots of trust for devices |
CN106575324A (en) | 2014-04-09 | 2017-04-19 | 有限公司Ictk | Authentication apparatus and method |
US20170118198A1 (en) | 2014-06-04 | 2017-04-27 | Token One Pty., Ltd. | Identity verification |
US20170126411A1 (en) | 2015-10-29 | 2017-05-04 | At&T Intellectual Property I, L.P. | Cryptographically signing an access point device broadcast message |
US20170187537A1 (en) | 2014-04-09 | 2017-06-29 | Ictk Co., Ltd. | Authentication apparatus and method |
US20170195459A1 (en) | 2015-12-30 | 2017-07-06 | Veniam, Inc. | Systems and methods for remote software update and distribution in a network of moving things |
US20170201499A1 (en) | 2015-02-05 | 2017-07-13 | Apple Inc. | Secure wireless communication between controllers and accessories |
US20170208418A1 (en) | 2014-05-26 | 2017-07-20 | Orange | Device and method for a gateway for the consistent updating of the services of a home network |
US20170249135A1 (en) | 2016-02-26 | 2017-08-31 | Ayla Networks, Inc. | Local over the air update of an embedded system |
US20170265066A1 (en) | 2016-03-10 | 2017-09-14 | Gainspan Corporation | Provisioning a dual mode wireless device for operation in accordance with a layer-2 wireless protocol after being operational in accordance with another layer-2 wireless protocol |
US20170310655A1 (en) | 2014-12-04 | 2017-10-26 | Telefonaktiebolaget Lm Ericsson (Publ) | Secure connections establishment |
US20170331670A1 (en) | 2016-05-13 | 2017-11-16 | Telefonaktiebolaget Lm Ericsson (Publ) | Network Architecture, Methods, and Devices for a Wireless Communications Network |
US20170359190A1 (en) | 2016-06-12 | 2017-12-14 | Apple Inc. | Selection of a Coordinator Device for an Automated Environment |
US20180054492A1 (en) | 2015-03-16 | 2018-02-22 | Lg Electronics Inc. | Method and device for supporting service by using application service platform in wireless communication system |
US20180091315A1 (en) | 2016-09-27 | 2018-03-29 | Qualcomm Incorporated | Revocation and updating of compromised root of trust (rot) |
CN107864490A (en) | 2016-09-21 | 2018-03-30 | 网件公司 | Client roaming in distributed multi-band wireless network system |
US20180098263A1 (en) * | 2016-09-30 | 2018-04-05 | Inplay Technologies LLC | Methods and systems for low latency wireless communication with a scalable hierarchial architecture |
US20180183603A1 (en) | 2016-12-28 | 2018-06-28 | Xiruo Liu | Remote attestation with hash-based signatures |
US20180183723A1 (en) * | 2016-12-28 | 2018-06-28 | Intel IP Corporation | Multiband aggregation data encapsulation |
US20180196945A1 (en) | 2017-01-11 | 2018-07-12 | Morgan State University | Decentralized root-of-trust framework for heterogeneous networks |
US20180239897A1 (en) | 2017-02-20 | 2018-08-23 | AlphaPoint | Performance of distributed system functions using a trusted execution environment |
US20180278697A1 (en) * | 2017-03-27 | 2018-09-27 | Intel IP Corporation | [5g next generation wi-fi] on the fly traffic steering for collocated multi-band aggregation |
US20180278625A1 (en) | 2017-03-24 | 2018-09-27 | Qualcomm Incorporated | Exchanging message authentication codes for additional security in a communication system |
US10133867B1 (en) | 2016-03-29 | 2018-11-20 | Amazon Technologies, Inc. | Trusted malware scanning |
US10142444B2 (en) | 2014-07-01 | 2018-11-27 | Trinity Mobile Networks, Inc. | Methods, devices, and systems for implementing centralized hybrid wireless self-organizing networks |
US10257868B2 (en) | 2012-01-11 | 2019-04-09 | Interdigital Patent Holdings, Inc. | Power saving method and apparatus |
US10484980B1 (en) | 2016-04-14 | 2019-11-19 | Marvell International Ltd. | Link layer service platform |
US10750415B2 (en) | 2012-11-06 | 2020-08-18 | Firetide, Inc. | Context-aware wireless roaming |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4200770A (en) | 1977-09-06 | 1980-04-29 | Stanford University | Cryptographic apparatus and method |
US20050243765A1 (en) | 2003-07-25 | 2005-11-03 | Schrader Mark E | Mesh network and piconet work system and method |
US7558960B2 (en) * | 2003-10-16 | 2009-07-07 | Cisco Technology, Inc. | Network infrastructure validation of network management frames |
US7944940B2 (en) * | 2007-06-22 | 2011-05-17 | Thomson Licensing | Method and apparatus for media access in contention-based networks |
CN105704835A (en) * | 2007-06-22 | 2016-06-22 | 汤姆逊许可公司 | Method for media access in competition-based network and equipment thereof |
WO2010138109A1 (en) * | 2009-05-26 | 2010-12-02 | Hewlett-Packard Development Company, L.P. | System and method for performing a management operation |
US9210140B2 (en) * | 2009-08-19 | 2015-12-08 | Solarflare Communications, Inc. | Remote functionality selection |
US9832019B2 (en) * | 2009-11-17 | 2017-11-28 | Unho Choi | Authentication in ubiquitous environment |
US9185018B2 (en) * | 2010-10-22 | 2015-11-10 | Brocade Communications Systems, Inc. | Path diagnosis in communication networks |
WO2013068649A1 (en) * | 2011-11-09 | 2013-05-16 | Nokia Corporation | Methods and apparatus for wireless networking connection |
KR102040621B1 (en) * | 2011-12-08 | 2019-11-05 | 엘지전자 주식회사 | Method and apparatus for setting up link at high-speed in wireless communication system |
US9292692B2 (en) * | 2014-05-05 | 2016-03-22 | Sypris Electronics, Llc | System and device for verifying the integrity of a system from its subcomponents |
US10454691B2 (en) * | 2016-05-24 | 2019-10-22 | Arizona Board Of Regents On Behalf Of Northern Arizona University | Systems implementing hierarchical levels of security |
US10785718B2 (en) | 2016-06-06 | 2020-09-22 | Apple Inc. | Software-enabled access point with power saving |
US11229023B2 (en) | 2017-04-21 | 2022-01-18 | Netgear, Inc. | Secure communication in network access points |
-
2017
- 2017-12-14 US US15/842,609 patent/US11229023B2/en active Active
- 2017-12-22 US US15/853,547 patent/US10999834B2/en active Active
-
2018
- 2018-04-13 US US15/952,995 patent/US10798702B2/en active Active
- 2018-04-16 US US15/954,411 patent/US10986626B2/en active Active
- 2018-04-23 CN CN201810370089.9A patent/CN108738047A/en active Pending
- 2018-04-23 CN CN201810365566.2A patent/CN108738017A/en active Pending
- 2018-04-23 CN CN201810365568.1A patent/CN108738052A/en active Pending
- 2018-04-23 CN CN201810370088.4A patent/CN108738101A/en active Pending
Patent Citations (99)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010002486A1 (en) | 1998-01-02 | 2001-05-31 | Cryptography Research, Inc. | Leak-resistant cryptographic method and apparatus |
CN1416232A (en) | 2001-10-31 | 2003-05-07 | 华为技术有限公司 | Method for controlling service priority for tunneling data packet in general packet wireless service |
US20040218683A1 (en) | 2003-05-01 | 2004-11-04 | Texas Instruments Incorporated | Multi-mode wireless devices having reduced-mode receivers |
US20040117626A1 (en) | 2003-09-12 | 2004-06-17 | Pioneer Research Center Usa, Inc. | Key exchange based on dsa type certificates |
US20050233693A1 (en) | 2004-04-16 | 2005-10-20 | Jeyhan Karaoguz | Over the air programming via a broadband access gateway |
US7668128B1 (en) | 2004-05-17 | 2010-02-23 | Avaya Inc. | Features of power save in 802.11e wireless local area networks (WLANs) |
US8259682B2 (en) | 2005-02-04 | 2012-09-04 | Toshiba America Research, Inc. | Framework of media-independent pre-authentication |
US7606175B1 (en) | 2005-04-15 | 2009-10-20 | Nvidia Corporation | Extended service set mesh path selection |
US20070064609A1 (en) * | 2005-09-06 | 2007-03-22 | Sony Corporation | Communication processing apparatus, communication control method and computer program |
US20080065816A1 (en) | 2006-09-07 | 2008-03-13 | Samsung Electronics Co., Ltd. | Firmware update method for mobile terminal and mobile terminal using the same |
US20080076392A1 (en) | 2006-09-22 | 2008-03-27 | Amit Khetawat | Method and apparatus for securing a wireless air interface |
US20080076412A1 (en) | 2006-09-22 | 2008-03-27 | Amit Khetawat | Method and apparatus for registering an access point |
US20080076393A1 (en) | 2006-09-22 | 2008-03-27 | Amit Khetawat | Method and apparatus for securing communication between an access point and a network controller |
US20080080414A1 (en) | 2006-10-02 | 2008-04-03 | Pascal Thubert | Backhaul-level call admission control for a wireless mesh network |
CN1987798A (en) | 2006-12-08 | 2007-06-27 | 杭州华为三康技术有限公司 | Communication method between data plane and control plane |
CN101442402A (en) | 2007-11-20 | 2009-05-27 | 华为技术有限公司 | Method, system and apparatus for authenticating access point equipment |
US20090165086A1 (en) | 2007-12-21 | 2009-06-25 | Spansion Llc | Random number generation through use of memory cell activity |
CN104796355A (en) | 2008-01-10 | 2015-07-22 | 苹果公司 | Apparatus and methods for network resource allocation |
US20090214036A1 (en) | 2008-02-22 | 2009-08-27 | Microsoft Corporation | Authentication mechanisms for wireless networks |
US20090320110A1 (en) | 2008-06-23 | 2009-12-24 | Nicolson Kenneth Alexander | Secure boot with optional components method |
US9525759B2 (en) | 2008-09-29 | 2016-12-20 | Marvell World Trade Ltd. | Physical layer data unit format |
US20100135201A1 (en) | 2008-12-03 | 2010-06-03 | At&T Mobility Ii Llc | Registration notification for mobile device management |
US20100182959A1 (en) | 2009-01-22 | 2010-07-22 | Qwest Communications Internationl Inc. | SIMULTANEOUS MULTI-MODE WiFi DIFFERENTIATED BY SSID |
US20100190457A1 (en) * | 2009-01-23 | 2010-07-29 | Yung-Szu Tu | Approximation method for signal-to-noise ratio soft information for a communications system |
US20110041003A1 (en) | 2009-03-05 | 2011-02-17 | Interdigital Patent Holdings, Inc. | METHOD AND APPARATUS FOR H(e)NB INTEGRITY VERIFICATION AND VALIDATION |
US20110010543A1 (en) | 2009-03-06 | 2011-01-13 | Interdigital Patent Holdings, Inc. | Platform validation and management of wireless devices |
US20110173457A1 (en) | 2009-08-14 | 2011-07-14 | Jeffrey Reh | Enhanced security for over the air (ota) firmware changes |
US8214653B1 (en) | 2009-09-04 | 2012-07-03 | Amazon Technologies, Inc. | Secured firmware updates |
US20110087887A1 (en) | 2009-10-09 | 2011-04-14 | Achim Luft | Methods and apparatus for digital attestation |
US20130198838A1 (en) | 2010-03-05 | 2013-08-01 | Interdigital Patent Holdings, Inc. | Method and apparatus for providing security to devices |
US20120005480A1 (en) | 2010-07-01 | 2012-01-05 | Rockwell Automation Technologies, Inc. | Methods for firmware signature |
US20120005369A1 (en) | 2010-07-02 | 2012-01-05 | Netgear, Inc. | System and method of tcp tunneling |
US20170026966A1 (en) | 2010-08-26 | 2017-01-26 | Thomson Licensing | White space usage for wireless local area network devices |
CN103460666A (en) | 2011-03-29 | 2013-12-18 | 日本电气株式会社 | Network system and method for acquiring VLAN tag information |
CN102291794A (en) | 2011-09-27 | 2011-12-21 | 杭州华三通信技术有限公司 | Channel switching method and equipment in MESH network |
US20140192785A1 (en) | 2011-09-30 | 2014-07-10 | Michelle X. Gong | Mitigating overlapping basic service set interference in smart grid networks |
US10257868B2 (en) | 2012-01-11 | 2019-04-09 | Interdigital Patent Holdings, Inc. | Power saving method and apparatus |
US20130185563A1 (en) | 2012-01-12 | 2013-07-18 | Gueorgui Djabarov | Multiple System Images for Over-The-Air Updates |
US20130268689A1 (en) | 2012-04-10 | 2013-10-10 | Intel Mobile Communications GmbH | Data processing device |
US20140006787A1 (en) | 2012-06-28 | 2014-01-02 | Qualcomm Incorporated | Method and apparatus for restricting access to a wireless system |
US20140119303A1 (en) | 2012-10-30 | 2014-05-01 | Electronics And Telecommunications Research Institute | Operating method of access point (ap) and station for coexistence of basic service sets having different bandwidths |
US20140123124A1 (en) | 2012-10-31 | 2014-05-01 | Aruba Networks, Inc. | Cloud-based firmware distribution service |
US10750415B2 (en) | 2012-11-06 | 2020-08-18 | Firetide, Inc. | Context-aware wireless roaming |
CN103067095A (en) | 2013-01-30 | 2013-04-24 | 北京全路通信信号研究设计院有限公司 | Multi-band WIFI (wireless fidelity) parallel transmission scheme based on waveguide tube transmission medium |
US20150382328A1 (en) * | 2013-02-06 | 2015-12-31 | China Mobile Communications Corporation | Method and device for indicating modulation and coding scheme, and method and device for receiving downlink data |
CN103167631A (en) | 2013-03-27 | 2013-06-19 | 杭州华三通信技术有限公司 | Mesh aggregation link establishing method and device |
US20160198350A1 (en) | 2013-07-03 | 2016-07-07 | Interdigital Patent Holdings, Inc. | Multi-band methods for interference limited wireless local area network systems |
US20150071307A1 (en) * | 2013-09-12 | 2015-03-12 | Nvidia Corporation | Communication interface and method for robust header compression of data flows |
US20160262163A1 (en) | 2013-10-15 | 2016-09-08 | Aoife Solutions, S.L. | System and method for decentralized control of wireless networks |
CN103648109A (en) | 2013-12-09 | 2014-03-19 | 成都飞鱼星科技开发有限公司 | Wireless distributed forwarding system and method thereof |
US20150245182A1 (en) | 2014-02-25 | 2015-08-27 | Cambridge Silicon Radio Limited | Update management |
US20150261521A1 (en) | 2014-03-11 | 2015-09-17 | Hyuksang CHOI | Mobile system including firmware verification function and firmware update method thereof |
US20150271017A1 (en) | 2014-03-23 | 2015-09-24 | Avaya Inc. | Configuration of networks using switch device access of remote server |
CN104955102A (en) | 2014-03-24 | 2015-09-30 | 网件公司 | Multi-band wireless station having multiple radios in one band |
US20170187537A1 (en) | 2014-04-09 | 2017-06-29 | Ictk Co., Ltd. | Authentication apparatus and method |
CN106575324A (en) | 2014-04-09 | 2017-04-19 | 有限公司Ictk | Authentication apparatus and method |
US20170208418A1 (en) | 2014-05-26 | 2017-07-20 | Orange | Device and method for a gateway for the consistent updating of the services of a home network |
US20170118198A1 (en) | 2014-06-04 | 2017-04-27 | Token One Pty., Ltd. | Identity verification |
US20150363576A1 (en) | 2014-06-11 | 2015-12-17 | Arris Enterprises, Inc. | Restricted Code Signing |
US10142444B2 (en) | 2014-07-01 | 2018-11-27 | Trinity Mobile Networks, Inc. | Methods, devices, and systems for implementing centralized hybrid wireless self-organizing networks |
US20160029356A1 (en) | 2014-07-25 | 2016-01-28 | Aruba Networks, Inc. | Dynamic user-configurable information element |
US20160036814A1 (en) | 2014-07-30 | 2016-02-04 | Master Lock Company Llc | Wireless firmware updates |
US20160036956A1 (en) | 2014-07-30 | 2016-02-04 | Google Technology Holdings LLC | Contextually updating wireless device firmware |
US20160119052A1 (en) | 2014-10-27 | 2016-04-28 | At&T Intellectual Property I, L.P. | Techniques for In-Flight Connectivity |
US20170310655A1 (en) | 2014-12-04 | 2017-10-26 | Telefonaktiebolaget Lm Ericsson (Publ) | Secure connections establishment |
US20160212745A1 (en) | 2015-01-21 | 2016-07-21 | Telefonaktiebolaget L M Ericsson (Publ) | Wireless Local Area Network Access Points |
US20160227440A1 (en) | 2015-01-30 | 2016-08-04 | Nokia Solutions And Networks Oy | Controlling LTE/Wi-Fi Aggregation |
US20170201499A1 (en) | 2015-02-05 | 2017-07-13 | Apple Inc. | Secure wireless communication between controllers and accessories |
US20160262160A1 (en) * | 2015-03-03 | 2016-09-08 | Comcast Cable Communications, Llc | Dynamic adaptive network |
US20180054492A1 (en) | 2015-03-16 | 2018-02-22 | Lg Electronics Inc. | Method and device for supporting service by using application service platform in wireless communication system |
US20160280370A1 (en) | 2015-03-27 | 2016-09-29 | Amazon Technologies, Inc. | Influencing acceptance of messages in unmanned vehicles |
US20160294829A1 (en) | 2015-04-02 | 2016-10-06 | The Boeing Company | Secure provisioning of devices for manufacturing and maintenance |
US20160301566A1 (en) * | 2015-04-10 | 2016-10-13 | Comcast Cable Communications, Llc | Virtual gateway control and management |
WO2016162763A1 (en) | 2015-04-10 | 2016-10-13 | Telefonaktiebolaget Lm Ericsson (Publ) | System and method to support inter-wireless local area network communication by a radio access network |
US20160366229A1 (en) | 2015-06-09 | 2016-12-15 | Kabushiki Kaisha Toshiba | Communication device, communication system, and computer program product |
CN105050081A (en) | 2015-08-19 | 2015-11-11 | 腾讯科技(深圳)有限公司 | Method, device and system for connecting network access device to wireless network access point |
US20170086152A1 (en) * | 2015-09-17 | 2017-03-23 | Qualcomm Incorporated | Listen-before-talk mechanism |
US20170093645A1 (en) | 2015-09-21 | 2017-03-30 | Splunk Inc. | Displaying Interactive Topology Maps Of Cloud Computing Resources |
US20170090909A1 (en) | 2015-09-25 | 2017-03-30 | Qualcomm Incorporated | Secure patch updates for programmable memories |
US20170093800A1 (en) | 2015-09-26 | 2017-03-30 | Intel Corporation | Data protection keys |
US20170104580A1 (en) | 2015-10-12 | 2017-04-13 | Microsoft Technology Licensing, Llc | Migrating secrets using hardware roots of trust for devices |
US20170126411A1 (en) | 2015-10-29 | 2017-05-04 | At&T Intellectual Property I, L.P. | Cryptographically signing an access point device broadcast message |
US20170195459A1 (en) | 2015-12-30 | 2017-07-06 | Veniam, Inc. | Systems and methods for remote software update and distribution in a network of moving things |
US20170249135A1 (en) | 2016-02-26 | 2017-08-31 | Ayla Networks, Inc. | Local over the air update of an embedded system |
US20170265066A1 (en) | 2016-03-10 | 2017-09-14 | Gainspan Corporation | Provisioning a dual mode wireless device for operation in accordance with a layer-2 wireless protocol after being operational in accordance with another layer-2 wireless protocol |
US10133867B1 (en) | 2016-03-29 | 2018-11-20 | Amazon Technologies, Inc. | Trusted malware scanning |
US10484980B1 (en) | 2016-04-14 | 2019-11-19 | Marvell International Ltd. | Link layer service platform |
US20170331670A1 (en) | 2016-05-13 | 2017-11-16 | Telefonaktiebolaget Lm Ericsson (Publ) | Network Architecture, Methods, and Devices for a Wireless Communications Network |
US20170359190A1 (en) | 2016-06-12 | 2017-12-14 | Apple Inc. | Selection of a Coordinator Device for an Automated Environment |
CN106102074A (en) | 2016-08-11 | 2016-11-09 | 山东奥联信息科技有限公司 | Express highway all-way is wireless WIFI covering system |
CN107864490A (en) | 2016-09-21 | 2018-03-30 | 网件公司 | Client roaming in distributed multi-band wireless network system |
US20180091315A1 (en) | 2016-09-27 | 2018-03-29 | Qualcomm Incorporated | Revocation and updating of compromised root of trust (rot) |
US20180098263A1 (en) * | 2016-09-30 | 2018-04-05 | Inplay Technologies LLC | Methods and systems for low latency wireless communication with a scalable hierarchial architecture |
US20180183723A1 (en) * | 2016-12-28 | 2018-06-28 | Intel IP Corporation | Multiband aggregation data encapsulation |
US20180183603A1 (en) | 2016-12-28 | 2018-06-28 | Xiruo Liu | Remote attestation with hash-based signatures |
US20180196945A1 (en) | 2017-01-11 | 2018-07-12 | Morgan State University | Decentralized root-of-trust framework for heterogeneous networks |
US20180239897A1 (en) | 2017-02-20 | 2018-08-23 | AlphaPoint | Performance of distributed system functions using a trusted execution environment |
US20180278625A1 (en) | 2017-03-24 | 2018-09-27 | Qualcomm Incorporated | Exchanging message authentication codes for additional security in a communication system |
US20180278697A1 (en) * | 2017-03-27 | 2018-09-27 | Intel IP Corporation | [5g next generation wi-fi] on the fly traffic steering for collocated multi-band aggregation |
Also Published As
Publication number | Publication date |
---|---|
CN108738017A (en) | 2018-11-02 |
CN108738052A (en) | 2018-11-02 |
CN108738047A (en) | 2018-11-02 |
US20180310186A1 (en) | 2018-10-25 |
US20180310301A1 (en) | 2018-10-25 |
US20180309570A1 (en) | 2018-10-25 |
CN108738101A (en) | 2018-11-02 |
US10999834B2 (en) | 2021-05-04 |
US20180310221A1 (en) | 2018-10-25 |
US11229023B2 (en) | 2022-01-18 |
US10798702B2 (en) | 2020-10-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10986626B2 (en) | Robust control plane for management of a multi-band wireless networking system | |
JP7071015B2 (en) | Methods, network elements, and systems for determining network quality of service flow | |
JP6867500B2 (en) | Methods, network devices, and systems for implementing data processing, as well as storage media | |
EP2647175B1 (en) | Facilitating device-to-device communication | |
TW201944806A (en) | Facilitating quality of service flow remapping utilizing a service data adaptation protocol layer | |
US12063115B2 (en) | Systems and methods to reduce consecutive packet loss for delay critical traffic | |
EP3257203B1 (en) | Method and device for handling multi path connections | |
US10420134B2 (en) | System and method to facilitate subframe scheduling in a split medium access control radio access network environment | |
US20200107386A1 (en) | Improving communication reliability | |
US10270495B2 (en) | Segmented transfers in mobile networks using coordinated multipoint | |
US10225830B2 (en) | Processing method of data packet, terminal, base station and system | |
JP2013502850A (en) | Method and apparatus for multi-radio access technology layer for partitioning downlink-uplink across different radio access technologies | |
CN102577214B (en) | Method and apparatus for medium access control in-order delivery | |
US9357580B2 (en) | Method for switching communication connection mode, communication system, base station, transmitter and receiver | |
EP3579521A1 (en) | Selective duplication of data in hybrid access networks | |
WO2016074211A1 (en) | Data forwarding method and controller | |
WO2018014704A1 (en) | Harq-based transmission method and device | |
JP6609645B2 (en) | Wireless network function setting method, wireless network node, and core network device | |
JP7043623B2 (en) | Optimized URLLC scheduling policy for multi-node connectivity with data replication | |
TWI797414B (en) | Method for mobility enhancement and user equipment thereof | |
US11184799B2 (en) | WiFi TCP performance in multi-radio coexistence cases | |
EP3166248B1 (en) | Systems and methods for managing high network data rates | |
JP2024520661A (en) | User equipment, scheduling node, method for user equipment, and method for scheduling node - Patents.com | |
US11246060B2 (en) | Network node communication | |
US10284518B2 (en) | Network system with seamless handover mechanism, operation method and control apparatus thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
AS | Assignment |
Owner name: NETGEAR, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:AMINI, PEIMAN;EMMANUEL, JOSEPH AMALAN ARUL;REEL/FRAME:047835/0989 Effective date: 20181218 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: AWAITING TC RESP, ISSUE FEE PAYMENT RECEIVED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: AWAITING TC RESP, ISSUE FEE PAYMENT VERIFIED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |